GCC Teaching: 052445 LOG eSpace Concepts 1. LOG of the course, Groupware Competence Center, Paderborn 2002.

Log of the course eSpace Concepts 1

THEMES: GCC Teaching\Lecture 2002/0...
META STRUCTURES: GCC Activities\...\Lectures | GCC Teaching\Lecture 2002/0... | IE\Vorlesungen | Projects\...\Lectures | Projects\...\Lectures
YEAR: 2002
Login Login
User: Anonymous


PLACES: Paderborn
TIME: 2002
 
09.12.
Sample Questions
Disclaimer: The purpose of these questions is to review the content of todays lecture. The questions have been posted by students from the course and are not entirely reviewed.

Responsible for today's questions are:

Team Number
Student Names
Team 13Boris Biehl, Helene Heinle, Nils Hoffmann
Team 14Stefan Kramkowski, Christian Mueller, Maria-RosarioMolina
Team 15Karoline Senfft-von-Pilsach, Sebastian Wilhelm, Maik Pioch


Question 1: 3.7 Creating intelligent interactive Documents

RichText

An embedded view is an object used to navigate

A) between documents.

B) within a folder.

C) between folders.

D) within a document.




Question 2: 3.8 Creating intelligent interactive Documents

RichText

Please check correct statements about Embedded Views

A) An embedded view can show a subset of all documents in the view that match a certain criteria.

B) Embedded views in documents have to be updated manually by a documents editor if the displayed documents do not match the criteria any more.

C) Embedded view cannot be embedded in RichText fields.

D) By double clicking a document in the Embedded View, the document will be opened.




Question 3: 3.10 Creating intelligent interactive Documents

RichText

Which of the following field types can contain file attachments?

A) Date/Time.

B) RichText.

C) RichText list.

D) Body.




Question 4: 3.11 Creating intelligent interactive Documents

RichText

Which of the following geometric forms are available as hotspot forms within imagemaps in a Lotus Notes/Domino environment?

A) Polygon.

B) Point.

C) Cube.

D) Circle.




Question 5: 5.1 Security Architectures

Security Layer

Which of the layers in the Domino security layer model can be considered as a "hard" security feature?

A) Network.

B) View/Form Access.

C) Domino Server.

D) Database.




Question 6: 5.2 Security Architectures

Security Layer

Which of the following layers in the Domino security layer model do not exist?

A) Domino Server.

B) User authentication.

C) Section Reader.

D) Database.




Question 7: 5.3 Security Architectures

Security Layer

Which of the following layers in the Domino security layer model do not exist?

A) Domino Server.

B) User authentication.

C) Section Reader.

D) Database.




Question 8: 5.4 Security Architectures

Access Control List (ACL)

A user that has been granted "Author" access to a database can perform which of the following actions by default?

A) Create documents.

B) Modify design elements.

C) Edit documents that list him as author.

D) Read documents created by other users.




Question 9: 5.10 Security Architectures

Access Control List (ACL)

Fill in the blank in the following sentence about the ACL:

Only a person with the access level

.................................................

is allowed to make changes to the ACL.




Question 10: 5.11 Security Architectures

Security Layer

Fill in the blank in the following sentence about the Domino security layers (Funnel model):

In the Domino security layer model, the top level security layer is the

.................................................

layer.